20%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
20%
13.04.2023
laytonjb laytonjb 4096 Mar 14 19:43 cache
12 -rw-rw-r-- 1 laytonjb laytonjb 11277 Mar 14 19:43 termcolor-2.2.0-pyhd8ed1ab_0.conda
4 drwxrwxr-x 4 laytonjb laytonjb 4096 Mar 14 19:43 termcolor-2.2.0-pyhd8ed1ab
20%
25.09.2013
)
8 (4)
7.2
0.9
Nehalem-EP (2009)
8 (4)
32
4
Westmere-EP (2010)
12 (6)
42
3.5
Westmere-EP (2010)
8 (4)
42
20%
05.12.2016
. The holdingdisk section (lines 22 to 26) specifies the key data for such a holding disk. In Listing 1, Amanda is allowed to cache data in the /amanda/holding directory, where it can use a maximum of 50MB space; any
20%
10.04.2015
]
09 }
The next step is to define what action to trigger. The syntax is:
watchman -- trigger /opt/repos 'repos-sync' \
-- /usr/local/sbin/sync.sh /opt/repos
Where 'repos
20%
28.11.2023
image: monitoror/monitoror:${MTRRTAG:-latest}
05 ports:
06 - "38080:8080"
07 environment:
08 - "MO_CONFIG=/etc/config.json"
09 restart: unless-stopped
10
11 networks:
12 default
20%
14.03.2013
,
09 sizeof(j));
10 [...]
11 MALLOC(pr, struct prison *,
12 sizeof(*pr),
13 M_PRISON, M_WAITOK | M_ZERO);
14 [...]
15 error = copyinstr(j.path,
16 &pr->pr_path, sizeof
20%
02.02.2021
of their toolkits.
For example, you can install and use Splunk Enterprise and its Machine Learning Toolkit (Figure 6) with a trial license for up to 60 days and index up to 500MB of data per day. The software
20%
05.02.2019
Host *:80>
02 ServerAdmin webmaster@localhost
03 ServerName localhost
04
05 DocumentRoot /var/www/suitecrm/
06
07 Options FollowSymLinks
08 AllowOverride None
09
20%
21.01.2020
local server machine (Listing 1). In this example, the four drives sdb
to sde
in lines 12, 13, 15, and 16 will be used to create the NVMe target. Each drive is 7TB, which you can verify